Rapid7 Vulnerability & Exploit Database

Joomla!: [20151206] - Core - Session Hardening

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Joomla!: [20151206] - Core - Session Hardening

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
12/24/2015
Created
07/25/2018
Added
12/24/2015
Modified
12/24/2015

Description

The Joomla Security Strike team has been following up on the critical security vulnerability patched last week. Since the recent update it has become clear that the root cause is a bug in PHP itself. This was fixed by PHP in September of 2015 with the releases of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all versions of PHP 7 and has been back-ported in some specific Linux LTS versions of PHP 5.3). This fixes the bug across all supported PHP versions.

Solution(s)

  • joomla-upgrade-3_4_7

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;